Smartphone Security

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg
Showing posts with label on. Show all posts
Showing posts with label on. Show all posts

Sunday, 28 July 2013

Find out How Healthy Your Battery is on Your Laptop

Posted on 00:00 by Unknown
Find out How Healthy Your Battery is on Your Laptop 
Windows 8 has a feature through which we can find out exactly how much battery you are actually getting from your Laptop battery, i.e. its efficiency, maximum charge potential.  It's a well-known fact that as the age of lithium battery increases its charging capacity decreases and it won't charge to its full potential as when it's new. We can find out exactly how much the battery of laptop is giving now. We can use the powercfg -energy to find out how health your battery is.
1. When you are in the Metro UI, start typing "cmd". It will automatically go in to search mode and will search for what you typed (cmd).
2. Type "powercfg –energy" into the command prompt & press Enter.
3. The command enables tracing for 60 seconds & would collect all the data after observing the system behavior.
4. After analysis it would generate a report.
5. The energy report is generated in HTML format in the directory shown in the command prompt.
Cmd Prompt Address\energy-report.html by default.
6. In the HTML file, scroll to the end till you get information.

This shows the battery ID, Manufacturer name, Chemistry, Design capacity and most importantly the last full charge.

Read More
Posted in Battery, find, healthy, How, Is, LAPTOP, on, out, your | No comments

Saturday, 27 July 2013

Customize the Windows 7 log-on screen

Posted on 05:44 by Unknown
Customize the Windows 7 log-on screen
Windows 7 makes it easy changing the Windows log-on screen.
1.  Go to start, and click on Run, type Regedit & press enter there.
2.  Navigate to :
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background
3.  Double-click the OEMBackground DWORD key
4.  Set value of the key to 1.
5.  Select a background image for Logon Screen with size less than 256KB in size (Use of Image Resize software like VSO Resizer can help)
6.  Copy that image into the
C:\Windows\system32\oobe\info\backgrounds folder
7.  Rename the image to backgroundDefault.jpg
8.  Reboot, and now your logon Image would have changed.

Read More
Posted in 7, Customize, log, on, screen, The, Windows | No comments

Wednesday, 3 July 2013

Tips for Password Safety On The Internet

Posted on 10:42 by Unknown
Tips for Password Safety On The Internet

1. Protect them 
Never, ever give your password (on Facebook, Instagram, Skype, email, or any similar service) or cell phone unlock code to anyone even a friend.  Friendships sometimes don't last, and that password can be used against you.

2. Remember your secret answer 
When you create an online account, and it asks you to provide an answer to a question you should know - don’t treat it lightly or as a joke.  Make sure it's something you will remember months and years from now in case you have a problem at that time.

3. Don’t disclose information about you 
Do not use passwords based on personal information.
(your login name, birthdate, address, phone number, middle name, pet's name, etc.).

4. Mix it up 
Use a mixture of upper and lower-case letters, numbers, and non-alphabetic characters (symbols) if possible.

5. Be creative 
When creating a password, make your own acronym from a phrase that means something to you, and group together the first letter of each word.  Use numbers and symbols when you can.  Make sure the acronym you create has at least seven characters. Here are some examples:

 “Last week I fell down thirty stairs” (Lw1fd30$) 
 “It’s 3am, I must be lonely” (I3amimbL) 
 “Baby you were born this way, Gaga#1”  (BuwbtwGAGA#1) 

6. Change it up 
Change your password often.  It takes time and is a bit of a chore, but do it anyway.  It takes more time and is more of a chore to try to recover from a hacked account or from identity theft.

7. Don’t send it to others 
Never provide your password via a text message or over email or in response to a request.  You could accidentally send it to the wrong person or that person might show it to someone else. Or it could be a scam.

8. Don’t post it 
Do not place a written copy of your password on the side of your monitor, under your keyboard, in your laptop case, etc.  Figure out a secure place where you can store the passwords you write down or, if possible never write down any passwords; it is best to commit them to memory or use highly-rated password manager software.

9. Avoid entering on untrusted devices 
Do not type passwords on devices that you do not own, control, or fully trust.  Computers in Internet cafés, school labs, airports, libraries, or similar public places should only be used for anonymous Web browsing, and not for logging into your online accounts.

10. Use different passwords 
Don't use the same password across all of the online accounts you have. Try to use different passwords at different sites, so that one hacked account doesn’t lead to other accounts being hacked.
Read More
Posted in Internet, on, password, Safety, The, Tips | No comments

Tuesday, 14 May 2013

Anonymity on the web

Posted on 19:58 by Unknown

Anonymity on the web
I can see you hiding in the shadows over there and so can the logs of all the web sites, FTP servers and other nooks and crannies you visit on the web. The sort of information gathered by these logs and which is available to the webmasters of the sites you visit include the address of the previous site you visited, your IP address, your computer's ID name, your physical location and the name of your ISP along with less personal details such as the operating system you're using and your screen resolution. If someone was snooping through your dustbin to gather information on consumer trends or tracking your every move to see where it is you go everyday you wouldn't be too chuffed would you. Well the web is no different, it's still an invasion of privacy and a threat to security and you don't have to put up with it.

Proxy servers:
Every time you visit a web site, detailed information about your system is automatically provided to the webmaster. This information can be used by hackers to exploit your computer or can be forwarded to the market research departments of consumer corporations who by tracking your activities on the internet are better equipped to direct more relevant spam at you. Your best defence against this is to use what is known as a proxy server, which will hide revealing information from the web sites you visit, allowing you to surf the web anonymously. These work by altering the way in which your browser retrieves web pages or connects to remote servers. With a proxy server set up, whenever you 'ask' IE or Netscape to look at a web page, the request is first sent through an external server which is completely independent of your ISP's servers. This third party server then does the requesting on your behalf so that it appears that the request came from them rather than you and your real IP address is never disclosed to the sites you visit. There is nothing to download and the whole process takes less than a minute.

There are two different ways to use proxy servers and both have their advantages and disadvantages. The first method is to use a web based service. What this involves is visiting the proxy's home page each time you want to browse a web site anonymously. The core component of such a system is the dialog box where you enter the address of the web site you want to visit. Each time you enter the URL of the site you want to browse via the proxy into this box, your personal information, IP address and so on is first encrypted before being sent to the site allowing you to maintain your anonymity. Two of the best examples of this type of web based proxy service are Code:
hxxp://www.rewebber.com/
and hxxp://www.anonymizer.com/. Replace xx with tt.

Obviously one disadvantage of using a web based service like Rewebber or Anonymizer, however, is that you have to visit the proxies home page each time you want to surf anonymously. You could choose to select this page as your default home page, but it's still quite awkward if you're forever site hopping at the speed of light. The second main 'con' is that you often have to put up with extra adverts on the pages you visit. These are automatically inserted into the pages by the proxy - they have to pay for service somehow. More sophisticated and convenient solutions are also on offer yet they come with a price tag.

The second method you can use to protect your privacy via a proxy server involves adjusting the settings of your web browser so that you can surf anonymously without having to visit the home page of your proxy each time. To do this you will first need to know the name of your proxy server and the port number it uses. This information can be gleaned from either a public proxy server list or the FAQ referring to a private subscription based service. Once you have the name of the proxy server you wish to use, select 'Internet Options' from the 'Tools' menu of your browser. Now select 'Connections' followed by 'Settings' and tick the 'use a proxy server' check box. To finish the job all you have to do now is enter the name of the server in the 'address' box, the port which it uses in the 'port' box and go forth and surf anonymously.

Free, manual proxy servers as advertised on anonymity sites, if you can find one at all, are likely to be highly oversubscribed, and as a result the speed at which they retrieve web pages can deteriorate. In which case you can go in pursuit of a public proxy server list and select an alternative from it, which can then be set up manually. To locate such a list you can investigate sites such as Code:
hxxp://www.proxys4all.com/

however, this method isn't problem free either, so before you get too carried away and go jumping on the anonymity bandwagon there are a few things you should be aware of. It's very easy to use proxies to protect your privacy, but often the disadvantages of using them far out weigh the benefits. You see, the problem is that, like the proxy servers provided Rewebber et al, free, public proxies are nearly all over subscribed and so they can slow down web browsing considerably. Digging out fast reliable proxy servers is an art form in itself and is a skill which takes considerable practice. You could find a list of public proxy servers and then experiment with each one until you find one that runs at a reasonable speed, but this can be very time consuming and frustrating. Instead, your search would be much more efficient if you got a dedicated program to carry out this task for you. There are literally dozens of proxy seeking programs around which can do just that, and many of them are available as freeware. What these do is scan the internet for public proxy servers. These servers are then tested for speed and anonymity (not all of them are truly anonymous, even if they claim to be!) and once you find one which suits your requirements you can select it as your default proxy with the click of a button.

One of the most significant advantages of using an automated tool to locate proxy servers is that you do not have to keep editing your proxy settings manually each time you wish to try out a new one. Instead, what you do is enter 'localhost' or '127.0.0.1' into the 'address' box and '8088' into the 'port' box of your browser's proxy settings menu and then forget about it. All future proxy switching is then orchestrated from within your proxy seeking software, which subsequently relays the information to your browser or whatever type of application you are attempting to make anonymous. For those of you who are curious 'localhost' and the IP address '127.0.0.1' are the names by which every computer on the internet refers to itself.
Here's a good selection of links, which should help you to get started - Code:
hxxp://www.a4proxy.com/ Anonymity 4 Proxy
hxxp://www.helgasoft.com/hiproxy/ Hi Proxy
hxxp://www.proxy-verifier.com/ Proxy Verifier
hxxp://www.photono-software.de/ Stealther.

You may find that even when using these programs you have difficulty finding good proxy servers. It is for this reason that many people choose only to use proxy servers temporarily whilst doing something which may land them in trouble with their ISP, or in a worst case scenario with the law. The most obvious example of a situation in which you would want to cover your tracks is when scanning for public FTP servers and subsequently uploading to them. Most other net activities are unlikely to incur serious consequences so under these circumstances you can safely surf the web without a proxy. If you're really serious about protecting your privacy, however, your best bet is probably to invest in a dedicated, stable proxy such as the ones offered by Code:
hxxp://www.ultimate-anonymity.com/ Ultimate Anonymity

These aren't free, but may be worth the expense if you aren't keen on continuously switching proxy servers.

Before splashing out though it may be worth checking if your current ISP has a proxy server of its own which you can use. These aren't there to help you to commit cyber crimes and get away with it, they actually have a legitimate purpose as well - otherwise they wouldn't exist. You see, proxy servers were originally designed to help speed up web page loading times. Proxy servers contain a cache of all the web pages which have been requested via the browsers of the people using the proxy. When someone surfs the web using a proxy, the proxy first checks to see if it already has a copy of the web page stored in its cache. If this version of the page is bang up to date, it is sent to your computer and appears in your browser. If the page found in the cache of the proxy server is older than the one stored on the server hosting the page, a new request to the web server is made and the page is updated in the cache of the proxy before being sent to you. Because these servers use very fast internet connections they can retrieve web pages at much greater speeds than you can via your modest home setup. If these servers are located physically nearer to your home than the web host servers you wish to retrieve web pages from, the speed at which you browse the web will be accelerated.

Anonymity - Cookies
One last important point you need to be aware of before jumping in with both feet is that different programs have to be setup in different ways before being able to make external connections via a proxy server. For example, you can surf the web anonymously by modifying the settings in Internet Explorer or Netscape Navigator as explained earlier in this tutorial, but this will only affect your browser. If you then used Flash FXP to copy a batch of 0-day releases from one FTP server to another, this isn't going to protect you in the slightest. What you have to do is enter the name of the proxy server into each application you wish to make anonymous before making any external connections. This can usually be done by browsing through the preferences of your program to see if there is a 'use proxy server' option available. If there is, make sure you use it!

Cookies:
You have little to fear from the edible variety, but the digital ones can be a major threat to your security and privacy. A cookie is a tiny text file (usually less than 1kb in size), which is created and stored on your hard drive whenever you visit a dynamic (or an interactive if you like) web site. These are used to log your personal details so that you can access members only areas of web sites without having to type in a password every time, or to retain your customised settings so that they are available the next time you visit. If you're using a shared computer, anyone who visits the same site that you have previously logged in to can access your accounts. This is particularly worrying if you have entered your credit card details into a form on an e-commerce site. If your browser is set to automatically fill in these details whenever you return to a previously visited site, this information could be clearly visible - you don't need me to explain the problems this could entail.

The solution to this problem is to delete any cookies which contain sensitive data once you have completed your transactions. Your cookies will be stored in a different place depending on which operating system you are using so you will have to use your detective skills to find them. As an example, in Windows XP they are located in your 'c:\Documents and Settings\Kylie Minogue\Cookies' directory (that is if your name is Kylie Minogue. Mine isn't in case you're wondering!). If you look in this directory, in some cases it is easy to identify which cookie is associated with which web site, but in other cases it's not so obvious. The cookie which was created when you visited Yahoo.com to check your email may be called kylieminogue@yahoo.txt for example. Unfortunately some cookies refer to the IP address of the site you visited and so look more like kylie minogue@145.147.25.21. These cookies can be selectively deleted one at a time if it's obvious which ones are causing a threat to your security, or you can just wipe out the whole lot in one fell swoop and have them recreated as and when they are required. However, if you're really struggling to find your cookie jar, you could delete your cookies via your browser's tool bar instead. In Internet Explorer this can be done through the 'Tools' > 'Internet Options' menu items.

If all this sounds like too much hassle, you can always find a labour saving program which will be happy to take the job off your hands. These 'cookie crunching' programs allow you to be more selective when editing, viewing and deleting cookies from your system, and some of them will even prevent cookies from being created in the first place. Yes, I know you're hungry for links so I won't deprive you. Have a look here - Code:
hxxp://www.rbaworld.com/Programs/CookieCruncher/ Cookie
Cruncher
hxxp://www.thelimitsoft.com/ Cookie Crusher
hxxp://www.angove.com/ Cookie Killer
hxxp://www.kburra.com/ Cookie Pal
and
hxxp://www.cookiecentral.com/ Cookie Web Kit.
Read More
Posted in Anonymity, on, The, web | No comments

Friday, 15 March 2013

Calculations On Command Prompt

Posted on 07:44 by Unknown

Calculations On Command Prompt
The command processor CMD.EXE comes with a mini-calculator that can perform simple arithmetic on 32-bit signed integers:

C:\>set /a 2+2
4
C:\>set /a 2*(9/2)
8
C:\>set /a (2*9)/2
9
C:\>set /a "31>>2"
7

Note that we had to quote the shift operator since it would otherwise be misinterpreted as a "redirect stdout and append" operator.

For more information, type set /? at the command prompt.
Check it out.
Read More
Posted in Calculations, Command, on, Prompt | No comments
Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • N.T. Rama Rao
    N.T. Rama Rao Nandamuri Taraka Rama Rao, also known as NTR, was born in 1923 in a well-to-do family in Andhra Pradesh. He showed interest in...
  • Breaking the Wishbone for Luck
    Breaking the Wishbone for Luck The tradition of pulling apart the wishbone, or clavicle, may be as much as 2,500 years old. Ancient Etruscan...
  • Celebrities before and after Photoshop
    Celebrities before and after  Photoshop Here is an interesting look at celebrities photos before and after photoshop. These can give you a f...
  • Soldering Tips
    Soldering Tips Soldering is accomplished by quickly heating the metal parts to be joined, and then applying a flux and a solder to the matin...
  • 20 Ugliest Celebrities
    20 Ugliest Celebrities By nature or personal choice, they are rich and famous and yet... ugly as hell!Ugliness is confined to external appea...
  • Interesting Facts About Typewriters
    Interesting Facts About Typewriters One of the first typewriters to allow typists to see work in progress was invented in 1855 by Giuseppe R...
  • 100 YEARSOF INDIAN CINEMA
    100 YEARS OF INDIAN CINEMA About a century ago, in 1912, Dadasaheb Phalke completed the first Indian feature film, Raja Harischandra and rel...
  • The Mysterious Nazca Lines
    The Mysterious Nazca Lines 1. The Nazca were an ancient people that lived in Peru, in South America, about 2,000 years ago. The people are w...
  • Ten Tips to Smartphone Security
    Ten Tips to Smartphone Security Smartphones continue to grow in popularity and are now as powerful and functional as many computers. It is i...
  • The Longest Mustache In The World
    The Longest Mustache In The World Ram Singh Chauhan of India is the proud owner of the world's longest moustache,officially recorded by ...

Categories

  • 10
  • 100
  • 101
  • 111
  • 12
  • 132
  • 148
  • 15
  • 16
  • 17
  • 17.RULES.TO.LIVE.BY.
  • 18
  • 19
  • 20
  • 2013
  • 21
  • 22
  • 25
  • 26
  • 3
  • 30
  • 35
  • 4
  • 47
  • 5
  • 50
  • 51
  • 56
  • 64th
  • 67
  • 67th
  • 7
  • 8
  • 9
  • a
  • ABORTION
  • about
  • achilles
  • Acidity
  • Acne
  • Actor
  • Actress
  • ADDICTION
  • Address
  • ADHD
  • Admin
  • Adopts
  • Ads
  • After
  • AGING
  • Aid
  • AK
  • ALCOHOL
  • alcoholism
  • alert
  • All
  • All About Albert Einstein
  • Allen
  • Almonds
  • Amazing
  • AMAZING FACTS ABOUT TATTOOS
  • Amazingly
  • American
  • Anatomy
  • and
  • Android
  • anger
  • Animal
  • animals
  • Annual
  • Anonymity
  • ANOTHER
  • Ant
  • ANTI
  • Antivirus
  • antivrus
  • Anxiety
  • any
  • Appetizing
  • Apple
  • Apple’s
  • applications
  • April
  • Archicebus
  • Armadillos
  • Around
  • ARP
  • arrow
  • Art
  • Articles
  • Artist
  • Arugula
  • Aspirin
  • Assign
  • Astronomical
  • Atlas
  • Attacks
  • Attitude
  • automatic
  • Awesome
  • Baatara
  • Back
  • Badger
  • Baking
  • ball
  • balls
  • BandWidth
  • Banner
  • Baroque
  • Basic
  • BASIL
  • Bat
  • Bathroom
  • Battery
  • Be
  • Bear
  • Beard
  • Beatles
  • beautifu
  • Beautiful
  • BEAUTY
  • Bee
  • Beep
  • Before
  • BELLY
  • Ben
  • Benefits
  • BERMUDA
  • BEST
  • Better
  • Big
  • biggest
  • Bill
  • BIOS
  • Birth
  • Bizarre
  • Black
  • Blog
  • Blood
  • blowing
  • Blue Hole
  • Body
  • Bodypainting
  • Bollywood
  • Bone
  • Boots
  • Bowling
  • Boys
  • BRAIN
  • BREAkfAsT
  • Breaking
  • BREATHING
  • Bridge
  • BROWN
  • Browser
  • Browsing
  • Bub
  • Buddhism
  • Build
  • Bundy
  • BURNING
  • Business
  • Bypass
  • Cabbage
  • Cactus
  • Cafe
  • Cake
  • Calculations
  • CALM
  • Camera
  • Can
  • Canada
  • Car Care Tips II
  • CARACAL
  • Carambola
  • Care
  • Careful
  • Caribbean
  • Castle
  • Cat
  • Cats
  • Cave
  • CD
  • celebrates
  • Celebrations
  • celebrities
  • Celebrity
  • Celebs
  • cell
  • CEREAL
  • Changes
  • Chapa
  • Chariot
  • check
  • CHILDREN’S DAY
  • China
  • Chinese
  • Chock
  • CHOCOLATE
  • Cholesterol
  • Christian
  • Chuck
  • Cider
  • CINEMA
  • CIRCLES
  • Circlism
  • Circus
  • City
  • ClickJacking
  • Clock
  • Clocks
  • Clown
  • Coca
  • cockroaches
  • Coconut
  • Code
  • Codes
  • Coffee
  • Cola
  • Colosseum
  • Command
  • Commandments
  • Committed
  • Common
  • Communication
  • Companies
  • Competition
  • completely
  • Computer
  • Computer.Pranks.50.in.1.AIO
  • Congress
  • Conjunctivitis
  • CONTACT
  • Conversation
  • Convert
  • Cookie
  • Cookies
  • Cool
  • Coping
  • Cosmetic
  • Cow
  • CRAVINGS
  • Crazy
  • Cream
  • Creative
  • Creatures
  • Crimes
  • Crocodile
  • Cross-sections of bullets
  • Crow
  • Cruz
  • ctr+c
  • ctr+v
  • Customize
  • Dairy
  • dam
  • DAMAGING
  • Dandruff
  • DARK
  • Day
  • Death
  • Deformities
  • Depression
  • Desk
  • desktop
  • Destructive
  • Devices
  • Devils
  • Diamond
  • Die
  • Diet
  • Different
  • Digital
  • dimples
  • DINING
  • Disable
  • Disciplines
  • Disease
  • disk
  • Disorder
  • Disorders
  • Display
  • Diwali
  • DNA
  • DNA Facts
  • DNS
  • do
  • Doctors
  • DOES
  • dog
  • Dogs
  • DONTS
  • Doong
  • Doppelgangers
  • Drag
  • Dragon
  • Drawbridge
  • Drawings
  • Dreams
  • Drinks
  • Drive
  • Drives
  • Dunns
  • Each
  • Early
  • Earthquake
  • EARTHWORM
  • easier
  • Easter
  • EASY
  • Echidna
  • Eckman
  • Ecstasy
  • Effective
  • Eggs
  • EIFFEL
  • EJACULATION
  • Elata
  • ELEGANT
  • Elephant
  • Eliminate
  • EMAIL
  • English
  • Enlightenment
  • Entire
  • Environment
  • Error
  • Espiritu Santo
  • Ethics
  • etiquette
  • Everyday
  • Everyone
  • Evil
  • evolution
  • Exam
  • Examination
  • Examples
  • Exercise
  • Exotic
  • Explained
  • express
  • Extrafine
  • EYE
  • Eyecare
  • Eyeglasses
  • EYES
  • Facebook
  • Faces
  • facts
  • Facts.About.Riboflavin.Vitamin. B.2.
  • fake
  • Falling
  • Falls
  • Fame
  • Family
  • Famous
  • Fascinating
  • Fast
  • Fat
  • favourite
  • FESTINA
  • Festival
  • FEVER
  • Fiji
  • FILES
  • film
  • find
  • Firewalls
  • First
  • Fish
  • Fit
  • Flash
  • Flax
  • FLOW
  • Fly
  • Flying
  • Foil
  • font
  • Food
  • FOODS
  • Fools
  • for
  • FORCIBLY
  • Forever
  • FOUL
  • Foxy
  • France
  • Free
  • Fried
  • Friends
  • Friendship
  • Frogs
  • from
  • Fruit
  • Ful
  • Fun
  • Fungus
  • funny
  • Fushun
  • Fussen Germay
  • Gacy
  • Gadjets
  • Garage
  • Garden
  • GARLIC
  • Gates
  • Gateshead Millennium Bridge
  • Gelatin
  • Genetic
  • Genetics
  • getting
  • Giraffe
  • girl
  • Girls
  • Glass
  • Glass Gem PopCorn
  • Globes
  • Glycerine
  • GOATS
  • God
  • Gold
  • golden
  • Golf
  • Gomateshwara
  • Good
  • Google
  • Gorge
  • GOUT
  • Grand
  • Gravies
  • Great
  • Green
  • GREYING
  • Grooming
  • Grouse.
  • GRRRREAT
  • Guide
  • Guinness World Records 1
  • Gun
  • Gunnison
  • Guns
  • guys
  • Habits
  • Hachiko
  • Hack
  • Hackers
  • Hagia
  • Hair
  • HAIRFALL
  • Half
  • Hall
  • Halloween
  • Happiness
  • Happy
  • HEADED
  • Health
  • Healthier
  • healthy
  • HEAT
  • Heine
  • help
  • Herbs
  • Hidden
  • Hide
  • High
  • Highly
  • Hijacker
  • HINDUISM
  • Hints
  • History
  • Holy
  • HOME
  • Hometown
  • Honey
  • Hookah
  • Hooker
  • Horse
  • Hot
  • Household
  • How
  • Howler
  • Human
  • Humans
  • HYPERTENSION
  • I
  • I.Q
  • Ice
  • icons
  • identify
  • II
  • Illustrations
  • IMPOTENCE
  • improve
  • in
  • Increase
  • Independence
  • India
  • INDIAN
  • Indias
  • Infamous
  • Infected
  • Installing
  • Int.
  • interesting
  • Internet
  • Introduction
  • iPhone
  • IRON
  • Is
  • Island
  • Jack
  • jackfruit
  • Jamaica
  • January
  • Japan
  • Jesús
  • John
  • jokes
  • Jr
  • Juice Fasting
  • Junk
  • Just
  • Kapok
  • keep
  • keeping
  • Keira
  • Key Loggers
  • Keyboard
  • Kidney
  • Kids
  • Kilimanjaro
  • Killer
  • killing
  • kinds
  • Kissing
  • Kitchen
  • kitten
  • Klementinum
  • Knife
  • Knightley
  • Know
  • Koalas
  • KONARK
  • l of
  • Lake
  • LANGUAGE
  • Lanka
  • Lantern
  • LAPTOP
  • laptops
  • Largest
  • Latitude
  • Laundry
  • Lavaredo
  • LEANING
  • Learning
  • Leg
  • Lego
  • LENTE
  • Lessons
  • Libra
  • Library
  • life
  • Light
  • lightening
  • Lights
  • likes
  • Lil
  • Lincoln
  • Lines
  • Linux
  • lion
  • Lips
  • LITTLE
  • LIVING
  • Lofoten
  • log
  • Longest
  • Longitude
  • LOOP
  • Loss
  • Lost
  • Louise
  • Love
  • low
  • Lowering
  • Luck
  • Mac
  • machine
  • Macropinna Microstoma
  • Made
  • Mafia
  • MAGNESIUM
  • Magnets
  • Maintain
  • make
  • makeup
  • MAKING
  • Malacara
  • Malware
  • manage
  • Manatee
  • Mango
  • Manual
  • Many
  • Marilyn
  • MARKS
  • Mathematics
  • MEAN
  • MEANING
  • Meats
  • Medicinal
  • Megatrends
  • Memory
  • Men
  • Mental
  • Mercury
  • message
  • Metal
  • Micro
  • Might
  • Milk
  • mind
  • Mobile
  • MOLES
  • Monkey
  • monolithic
  • Monroe
  • Mont
  • MoRaIne LaKe -20 dollar view
  • Moral
  • Moringa
  • MORNING
  • Most
  • Moth
  • Mothers
  • Mount
  • MS
  • MSWindows
  • Mug
  • Multiple
  • Mustache
  • my
  • MYOPIA
  • Mystery
  • Mystical
  • N
  • Nail
  • names
  • Natural
  • Nazca
  • Neodymium
  • Network
  • Neuschwanstein
  • Never
  • New
  • Nights
  • Nike Spoof and Copycat Logos
  • Noodles
  • Norris
  • Norway
  • Not
  • November
  • NTFS
  • Nutrition
  • Nutritional
  • NZ
  • O
  • OATsTAnDing
  • occasions
  • Ocelot
  • Of
  • office
  • Okapi
  • Oldest
  • OMG
  • on
  • Onion
  • online
  • OOo
  • OPOSSUMS
  • Optimum
  • Orange
  • Orchid
  • Oresund
  • Organic
  • organisms
  • organization
  • Original
  • os
  • out
  • Own
  • Oxymoron
  • Pagoda
  • Painting
  • paintings
  • Palace
  • Paper
  • Parents
  • Parrot
  • Part
  • Partition
  • password
  • Passwords
  • Pattaya
  • Patty
  • PCSX2
  • peace
  • peaks
  • Peel
  • Pegasus
  • Penelope
  • People
  • PERFECT
  • Performance
  • Phoenix
  • Phone
  • Photographers
  • Photos
  • Photoshop
  • Piano
  • Pie
  • Piercing
  • Pigs
  • Pilot
  • Pirates
  • PISA
  • Pistachio
  • Pomeranian
  • Pop
  • Popular
  • Portraits
  • POSITIVE
  • Positive Thinking
  • Potala
  • Prague
  • Pranks
  • Precepts
  • PREGNANCY
  • PREMATURE
  • Presidents
  • Pressure
  • prevent
  • PRICKLY
  • primate
  • Programs
  • Promote
  • Prompt
  • protect
  • Protocol
  • Psychotria
  • Puzzle
  • Quack
  • Queens
  • QUETZAL
  • Quick
  • Quotes
  • Raccoon
  • rajnikanth
  • Rama
  • Rambo
  • Rao
  • Rat
  • Rayong
  • Read
  • Real
  • Reasons
  • Recipes
  • recording
  • recover
  • REDUCE
  • Registry
  • REMEDIES
  • Remove
  • Reporting
  • Reptile
  • Republic Day
  • Resolution
  • restart
  • restrict
  • Rewire
  • RICE
  • Ring
  • Risks
  • River
  • Roboy
  • Rock
  • Rolex
  • Rolls
  • ROM
  • Roman
  • Room
  • Roraima
  • ROSE
  • Royce
  • Rugby
  • Rules
  • RulesThumb
  • Rupee
  • Safari
  • Safety
  • Sage
  • Salt
  • Samsung
  • Sanctuary
  • saving
  • Saying
  • Scan
  • Schimmel
  • SCORPIO
  • screen
  • Scribbles
  • Sculpture
  • Sculptures
  • Sea
  • Seasonings
  • Secret
  • Secrets
  • Secure
  • Security
  • Seed
  • SEMINAL
  • Serial
  • Sewing
  • SEX
  • SEXUAL DEBILITY
  • Shocking
  • Shoes
  • Short
  • shortcut
  • shortcuts
  • SHORTSIGHTEDNESS
  • Shot
  • Shots
  • Should
  • Shutdown
  • Shwedagon
  • SICKNESS
  • Sign
  • SIMPLE
  • Simply
  • Six
  • Skills
  • skin
  • SkinType
  • Slauerhoffbrug
  • Sleep
  • slim
  • Small
  • Smallest
  • Smartphone
  • smartphone photos
  • Smoothie
  • Snow
  • Soap
  • Soccer
  • Social
  • Soldering
  • Solutions
  • Solved
  • Some
  • Son
  • Sophia
  • Sorvagsvatn
  • Soybean
  • space
  • Speed
  • SPERMATORRHEA
  • Spider
  • Spirit
  • Split
  • spot
  • SPRAINS
  • Sprouts
  • Squirrel
  • Sri
  • Star
  • Start
  • StartIsBack
  • States
  • Statue
  • stay
  • Steampunk
  • STEPS
  • stick
  • StMichel
  • Stones
  • Story
  • Stress
  • Structure
  • studying
  • Success
  • Sucking
  • Sucks
  • Sugar
  • Sun
  • Super
  • Surgery
  • Swami
  • Sweaters
  • switch
  • System
  • System Tray
  • T
  • Taina
  • TAKE
  • taking
  • Tale
  • Talents
  • Talk
  • Tallest
  • Tattoo
  • Tattooed
  • Tattoos
  • Teachers
  • Techies
  • Technics
  • Ted
  • Television
  • Ten
  • Terminator
  • TERMITE
  • Terms
  • TEST
  • Text
  • Thai
  • Thailand
  • Than
  • Thanksgiving
  • that
  • The
  • their
  • Things
  • think
  • this
  • three
  • Thumbsucking
  • Tiger
  • Tilting
  • Time
  • Tips
  • TISSUE
  • To
  • to Do
  • Toads
  • Tobacco
  • Tollywood
  • Tooth
  • Toothache
  • Top
  • Top 14 Tips To Improve Your Sleep
  • Top 4 Substitutions Tips
  • Top Digital Cameras In India
  • Topics
  • Toting
  • TOWER
  • Toy
  • TRAIN
  • Treat
  • Tree
  • Trees
  • Trevor Williams
  • Triangle
  • Trio
  • Trivia
  • Trojan
  • Truth
  • Tulsi
  • Tweaks
  • Twenty
  • Types
  • Typewriters
  • UAC
  • Ubuntu
  • Ugliest
  • UNDER
  • United
  • Unlikely
  • UNsuccessful
  • Untranslatable
  • Up
  • Upgrading
  • Uptime
  • US
  • USB
  • Useless
  • Uses
  • using
  • Value
  • Vanuatu
  • Varanasi
  • Vardzia
  • Vegetables
  • Venus
  • Version
  • very
  • Via
  • Victoria
  • video
  • Vinegar
  • viruses
  • Vivekananda
  • Vivi
  • voice
  • vs
  • Waist
  • Water
  • Waterfall
  • way
  • Wayne
  • Ways
  • WEAKNESS
  • web
  • Weight
  • Wet
  • What
  • Which
  • while
  • Why
  • Wilderness
  • Win
  • Window
  • Windows
  • Windows 8
  • WINKING
  • Wisdom
  • Wishbone
  • with
  • without
  • Women
  • Wooden
  • Words
  • World
  • World!
  • worlds
  • WOW
  • X
  • XP
  • Year
  • Years
  • You
  • Young
  • your
  • YUCK
  • Zambia
  • Zebra

Blog Archive

  • ▼  2013 (478)
    • ▼  November (35)
      • Breaking the Wishbone for Luck
      • Thanksgiving Day 28-11-2013
      • A Reptile of Many Talents
      • Some Amazing Facts
      • Fun facts about Pomeranian dogs
      • Uses of Neodymium Magnets
      • Common Computer Terms
      • Fungus facts
      • EARTHWORM FACTS
      • Amazing Facts About Cats!
      • Animal fun facts
      • Chuck Norris Jokes
      • World Television Day - November 21
      • Story of a Famous dog in Japan - Hachiko
      • Different kinds of Malware
      • SPEED UP WEB BROWSING WITH GOOGLE DNS
      • Son Doong - the world’s largest cave
      • Lofoten Island, Norway
      • Installing Ubuntu from a USB memory stick
      • CHILDREN’S DAY
      • How to protect your USB from getting infected
      • Glass Gem PopCorn
      • Slauerhoffbrug ‘Flying’ Drawbridge
      • Mount Kilimanjaro: 25 fun facts
      • Fun facts About Micro-Organisms
      • AMAZING FACTS ABOUT COFFEE
      • Ten Tips to Smartphone Security
      • Mobile Phone Tips
      • Soldering Tips
      • ‘Diwali’ -the Festival of Lights
      • 10 tips to spot a fake Rolex
      • Parrot Facts
      • Amazing Facts About Human Body
      • Amazing Bone Facts
      • Fun facts about the Presidents of the United States
    • ►  October (49)
    • ►  September (58)
    • ►  August (75)
    • ►  July (42)
    • ►  June (32)
    • ►  May (27)
    • ►  April (8)
    • ►  March (56)
    • ►  February (28)
    • ►  January (68)
  • ►  2012 (22)
    • ►  December (22)
Powered by Blogger.

About Me

Unknown
View my complete profile